 I probably would use the sort of ever-changing, what's the ever-expanding, but you're absolutely right. Because what we saw when we started this office role around how to automate my data center? How do I get a cloud experience in my data center? What we see changing, and what kind of thing is driven by this whole app refactoring process, that customers want to deploy apps maybe in the cloud, maybe develop in the cloud, and so they need an extension to the automated data center into the cloud. And so really what you see from us is an expansion of that ACI concept to Ranga's point. We actually really didn't change. We're just extending it to container development platforms to different cloud environments. But it's the same idea. How do I automate the end-to-end network reach, as well as the segmentation? What is the right security regime in this cloud era? How is it evolving? Well, what we're doing is we're bringing tools like Tetration, which now runs on-prem and in the cloud, things like StealthWatch, which runs on-prem in the cloud, and simply bringing them security frameworks that are very effective, or I think a very capable, well-known security vendor, but bringing them the capability to run the same capabilities in their on-prem environments and their data centers, as well as in multiple public clouds. And that just eliminates the seams that hackers could maybe get into. It makes common policy possible so they can define policy around an application once, and have that apply across multiple environments, which not only is easier for them, but eliminates potential mistakes that they might make that might leave things open to a hacker. So for us, it's that simple, bringing very effective common frameworks for security across all these. Cisco has embraced the idea of being a platform, and not a siloed individual product line. And so for a service provider like CenturyLink, for us to be able to embrace that same philosophy of the platform of services, what that means is that our engineering and field ops folks, our operations teams, do all the hard work on the back end to make sure that we have established all of the right security, the right network, the reliability, the global scalability of our specific platform of services and being that leader in telecommunications. And then we're able to lay that Cisco platform on top of it. And what happens then from a product management level is once you've established that foundation, it's really plug and play. The customer calls and says, I need calling, I need meetings, I need whatever it is they need, and we build that solution and very quickly can put those components into play and get them to use the service right away. So what we've done across the portfolio, even in primary storage, is made sure that we've done all sorts of things that help you against a ransomware malware attack, keep the data encrypted. I think the key point, actually, I think SiliconANGLE wrote about this, is something like 98% of all enterprise is going to get broken into anyway. So it's great that you've got security software on the edge, whether that be IBM or RSA or BlueCode or Checkpoint or Who Cares Who You Buy the software from, but when they're in, they're stealing. And sometimes some accounts have told us they can track them down in a day, but if you're a giant global Fortune 500 with data centers, it may take you like a week. So it can be stealing stuff right and left. So we've done everything from, we have right once technology, right? So it's immutable data, you can't change it. We've got encryption, so if they steal it, guess what, they can't use it. But the other thing we've done is real protection against ransomware and malware. That's a great question in terms of modernization of infrastructure. And there's some really interesting trends that I think are occurring. And I think the one that's getting a lot of us is really edge computing. And what we're finding is, depending on the use case, it can be an enterprise application where you're trying to get localization of your data. It could be an IoT application where it's really critical for latency or bandwidth to keep compute and data close to the thing, if you will. Or it could be mobile edge computing where you want to do something like analytics and AI on a video stream before you tax the bandwidth of the cellular infrastructure with that data stream. So across the board, I think edge is super exciting. And you can't talk about edge with, like I said, talking about artificial intelligence. Another big trend, whether it's running native, running with an accelerator, an FPGA, I think we're seeing a myriad of use cases in that space. But Securities MDM, to your point, right? I've got software defined access. I've got mobile access points. I've got, you know, Tetration. I've got, you know, all of these products that are helping people that in the past, they were just patching holes in the dike. You know, hey, this happened. Let's put this software product in. This happened. Let's put this in. And we actually built a security practice like the last three or four years ago. It's growing. You know, the number of people that are, whether it's regulation, compliance, you know, I got a real problem. I think I've got a problem and I don't know what it is. Our ability to come back and sit down and say, let's evaluate what your situation is. So I was talking to the networking guys and said, wow, enterprise network is up, way up. What's driving that? The need to transform? Or is that, you know, what is it? They're like, a lot of times it's something or a long security that's making them step back and reevaluate. And then sometimes that translates into an entire network refresh. There are tools that people use and everybody's environment's a little different. So some might want to integrate in and use Ansible, Terraform, you know, tools like that. And so then you need code that'll help integrate into that. Other people are using service now for tickets so as something happens, integrate into that. People are using different types of devices, hopefully mostly Cisco, but they may be using others as well. We can extend code that goes into that. So it really helps to go in different areas and what's kind of cool is that are there's an amount of code that where people have the same problems, you know, you start doing something, everyone has to make the first few kind of same things in software. Let's get that into exchange. And so let's share that. There's places where partners are going to want to differentiate. Keep that to yourselves. Like use that as your differentiated offer. And then there's areas where people want to solve in communities of interest. So we have someone who does networking and he wants to do automation. He does it for power management in the utilities industry. So he wants a community that'll help write code that'll help for that area, you know. So people have different interests and we're hoping to help facilitate that because Cisco actually has a great community. We have a great community that we've been building over the last 30 years. They're the network experts. They're solving the real problems around the world. They work for partners, they work for customers and we're hoping that this will be a tool to get them to band together and contribute in a software kind of way. They have the right reason to be afraid because so many automation was created once, used it exactly once, right? And then you have the cost of traditional automation. You have the complexity to create a network automation. You guys realize that network automation, you cannot have network automation only work on a portion of your network. You have to work on majority if not all of your network, right? So that's become very complex. Just like you want a self-driving car. You can go buy a Tesla, a new car. You can drive on its own. But if you want your 10-year-old Toyota driving on its own, retrofitted, that's very complex. Well, that's today network automation I have to deal with. You have to deal with multi-vendor technology, multi-years of technology. So people spend a lot of money. The return are very small. So they have a right to be afraid of them. But the challenge there is, what's the alternative? Yeah, I think that is one of the things that's very unique about the DevNet community is within the community we have technical stakeholders from small startups to really large partners or huge enterprises. And when we're all here in the DevNet zone, we're all engineers and we're all exchanging ideas kind of no matter what the scale. So it becomes this great mixing of shared experiences and ideas and that is some of the most interesting conversations that I've actually heard this week is people talking about how maybe they're using one Cisco platform in these two very different environments and exchanging ideas about how they do that or maybe how they're using a Cisco platform with an open source tool and then people finding value and thinking, oh, maybe I can do that in my environment. So that part of the ecosystem and community is very interesting. And then we're also helping partners find each other. So we do a lot of work around here's a partner in the Cisco ecosystem who goes and installs Meraki networks, right? Here's a software partner who builds mapping technology on top of indoor Wi-Fi networks and getting those two together because the software partner is not going to install the network and the network person may not write that application in that way. And so bringing them together, we've had a lot of really good information coming back from the community around kind of finding each other and being able to deliver those outcomes. What are you guys doing? Tom, I'll start with you. How are you guys working together to infuse and integrate security into the technology so that from a customer's perspective, those risks dial down? Yeah, so Cisco's integrating security across all of our product portfolio, right? And that includes our data center portfolio all the way through our campus, our WAN, all those portfolios. So we continue to look for opportunities to integrate, you know, whether it's dual factor authentication or things like secure data center with a highly scalable multi-incense firewall in front of a data center, things like that. So we're definitely looking for areas and angles and opportunities for us to not only integrate it from a product standpoint, but also ensure that we are talking that story with our customers so that they know they can leverage Cisco for the full architecture from a security standpoint. And the same thing on the storage of the data from an encryption perspective, and as the data gets moved or is mobile, you know, that level of security and policy follows it, you know, wherever the data is. For secure, of course. And I mean, everybody always wants more performance. They want lower cost. Security in many ways has begun to trump those other two attributes. They've become table stakes security as well, but security is really number one now. Talk about that. Talk about the major trends that you're seeing. Well, of course, of course security now is top of mind for everyone. Board level conversations, executive level conversations all the time. I think what ends up happening is in the past we would think about it as network performance, cost, et cetera. Security as a tangent kind of side conversation. Now of course it's built into everything that we do.